Selected Areas in Cryptography -- SAC 2013
Springer Berlin (Verlag)
978-3-662-43413-0 (ISBN)
The Realm of the Pairings.- A Three-Level Sieve Algorithm for the Shortest Vector Problem.- Improvement and Efficient Implementation of a Lattice-based Signature Scheme.- Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware.- Practical approaches to varying network size in combinatorial key pre distribution schemes.- Similarities between encryption and decryption: how far can we go.- A Group Action on Z p and the Generalized DLP with Auxiliary Inputs.- Solving a 6120-bit DLP on a Desktop Computer.- Stream ciphers and authenticated encryption How to Recover Any Byte of Plaintext on RC4.- The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE.- AEGIS: A Fast Authenticated Encryption Algorithm.- Fast Exhaustive Search for Quadratic Systems in F2 on FPGAs.- Faster Hash-based Signatures with Bounded Leakage.- White-Box Security Notions for Symmetric Encryption Schemes.- Two Attacks on a White-Box AES Implementation.- Extended Generalized Feistel Networks using Matrix Representation.- Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.- Implementing Lightweight Block Ciphers on x86 Architectures.- A new index calculus algorithm with complexity L(1=4 + o(1)) in small characteristic.- High Precision Discrete Gaussian Sampling on FPGAs.- Discrete Ziggurat: A Time-Memory Trade-o for Sampling from a Gaussian Distribution over the Integers.- Elliptic Curves, Pairings and RSA A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over GF(p).- Exponentiating in Pairing Groups.- Faster Repeated Doublings on Binary Elliptic Curves.- Montgomery Multiplication Using Vector Instructions.- Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5.- Provable Second Preimage Resistance Revisited.- Multiple Limited-Birthday Distinguishers and Applications.- Horizontal Collision Correlation Attack on Elliptic Curves.- When Reverse-Engineering Meets Side-Channel Analysis - Digital Lock picking in Practice.
Erscheint lt. Verlag | 11.6.2014 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XV, 590 p. 107 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 920 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Algorithm analysis and problem complexity • applied cryptology • authentication • block and stream ciphers • cryptography • discrete logarithms • Elliptic Curve Cryptography • Hash Functions • hyperelliptic curve cryptography • lattices • MAC algorithms • mathematical foundations of cryptography • Pairing • public key algorithms • public key encryption • rsa • Security and Privacy • security services • side-channel attacks • symmetric cryptography |
ISBN-10 | 3-662-43413-X / 366243413X |
ISBN-13 | 978-3-662-43413-0 / 9783662434130 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich